What is IPv6

advertisement
1. What is IPv6?
Internet Protocol version 6 (IPv6) is a network layer IP standard used by
electronic devices to exchange data across a packet-switched internetwork. It
follows IPv4 as the second version of the Internet Protocol to be formally adopted
for general use.
ip v6
it ia a 128 bit size address
here we can see total 8 ocatates each octate size is 16 bits superated with “:”
it is in hexa decimal formate
these 3 types
1.unicast address
2.multicast address
3.anycast address
loopback address of ip v6 is ::1
What is mean by dns,dhcp.?
1. DNS(Domain Name Service):
—————————It’s mainly used to resolve from host name(FQDN-Fully Qualified Domain
Name) to IP address and IP address to host name.DNS mainly used in Internet.
DNS devide in form of hierarchical.
2. DHCP(Dynamic Host Configuration Protocol):
———————————————
DHCP use for provide IP address dnamically to client machine. If that client
not able to find DHCP server then client machine will go for APIPA(We have
range for APIPA which is 169.254.0.1-169.254.255.254).
what is maen different between hub and switch ?
HUB and SWITCH:
——————
Switch is expencive than hub. If more then one user try to send packet at a
time collision will occure but in switch we can send. Switch is full duplex.
Maximum bandwidth is 100 Mhz and that bandwidth is shared by all of the
PC’s connected to the hub. Data can be sent in both directions simultaneously,
the maximum available bandwidth is 200 Mbps, 100 Mbps each way, and
there are no other PC’s with which the bandwidth must be shared.
Difference between Router and Routing: Router: ———
Router is a device which is used to connect different network. A device or setup that
finds the best route between any two networks, even if there are several networks to
traverse. Like bridges, remote sites can be connected using routers over dedicated or
switched lines to create WANs.
Routing: ———Process of delivering a message across one or more networks via the most appropriate
path.
what is a Firewall:
Firewalls are of two types:
-Hardware Firewall
-Software Firewall.
Firewall in simple manner is bascially the utility to provide the security over
the network. These are the security measures that prevents the network’s in
and out traffic to pass through the specific Security filters so that the unwanted
and unsecure data can be stopped from entering into the network..
further… as a security measure it also depends on the network designer and
implementer that how to use a Firewall mean to say the security measures like
how to present the content filtering and Url filtering which type of firewall
should be used and where to put it..
Firewall are the rules which are used for Passing traffic thats is packets in
network layer and frame is datalink layer on a specific port it can be two type
1.Hardware
2.Software
11 TCP is a transport layer protocol sued for reliable delivery of segmented
packets
IP is network layer protocol used for end to end delivery of two nodes not
reliable.
Firewall are two types
1. Hardware Device
2. Software Firewall
Firewall work as a Filter whichever connect to broadband and router before
home Network and stop all virus coming form Internet
A firewall is simply a program or hardware device that filters the information
coming through the Internet connection into your private network or computer
system. If an incoming packet of information is flagged by the filters, it is not
allowed through.
Firewalls use one or more of three methods to control traffic flowing in and
out of the network:
5. What is VTP?
virtual trunking protocol. set up on switches to manage vlans.
What is the difference between TCP and UDP
TCP is a connection oriented protocol, which means that everytime a packet is
sent say from host A to B, we will get an acknowledgement. Whereas UDP on
the other hand, is a connection less protocol.
Where will it be used : TCP -> Say you have a file transfer and you need to
ensure that the file reaches intact, and time is not a factor, in such a case we
can use TCP.
UDP-> Media Streaming, question is say you are watching a movie…would
you prefer that your movie comes..perfectly….but u need to wait a long time
before you see the next frame ?..or would you prefer the movie to keep
streaming…Yes…The second option is definely better….This is when we
need UDP
TCP (Transmission Control Protocol) is a set of rules (protocol) used along
with the Internet Protocol (IP) to send data in the form of message units
between computers over the Internet. While IP takes care of handling the
actual delivery of the data, TCP takes care of keeping track of the individual
units of data (called packets) that a message is divided into for efficient
routing through the Internet.
7 Application
6 Presentation Upper Layers
5 Session
4 Transport
3 Network
2 Data Link Lower Layers
1 Physical
The application, presentation, and session layers are all application-oriented in
that they are responsible for presenting the application interface to the user.
All three are independent of the layers below them and are totally oblivious to
the means by which data gets to the application. These three layers are called
the upper layers.
The lower four layers deal with the transmission of data, covering the
packaging, routing, verification, and transmission of each data group. The
lower layers don’t worry about the type of data they receive or send to the
application, but deal simply with the task of sending it. They don’t
differentiate between the different applications in any way.
The following sections explain each layer to help you understand the
architecture of the OSI-RM (and later contrast it with the architecture of
TCP/IP).
The Application Layer
The application layer is the end-user interface to the OSI system. It is where
the applications, such as electronic mail, USENET news readers, or database
display modules, reside. The application layer’s task is to display received
information and send the user’s new data to the lower layers.
In distributed applications, such as client/server systems, the application layer
is where the client application resides. It communicates through the lower
layers to the server.
The Presentation Layer
The presentation layer’s task is to isolate the lower layers from the
application’s data format. It converts the data from the application into a
common format, often called the canonical representation. The presentation
layer processes machine-dependent data from the application layer into a
machine-independent format for the lower layers.
The presentation layer is where file formats and even character formats
(ASCII and EBCDIC, for example) are lost. The conversion from the
application data format takes place through a “common network programming
language” (as it is called in the OSI Reference Model documents) that has a
structured format.
The presentation layer does the reverse for incoming data. It is converted from
the common format into application-specific formats, based on the type of
application the machine has instructions for. If the data comes in without
reformatting instructions, the information might not be assembled in the
correct manner for the user’s application.
The Session Layer
The session layer organizes and synchronizes the exchange of data between
application processes. It works with the application layer to provide simple
data sets called synchronization points that let an application know how the
transmission and reception of data are progressing. In simplified terms, the
session layer can be thought of as a timing and flow control layer.
The session layer is involved in coordinating communications between
different applications, letting each know the status of the other. An error in
one application (whether on the same machine or across the country) is
handled by the session layer to let the receiving application know that the error
has occurred. The session layer can resynchronize applications that are
currently connected to each other. This can be necessary when
communications are temporarily interrupted, or when an error has occurred
that results in loss of data.
The Transport Layer
The transport layer, as its name suggests, is designed to provide the
“transparent transfer of data from a source end open system to a destination
end open system,” according to the OSI Reference Model. The transport layer
establishes, maintains, and terminates communications between two machines.
The transport layer is responsible for ensuring that data sent matches the data
received. This verification role is important in ensuring that data is correctly
sent, with a resend if an error was detected. The transport layer manages the
sending of data, determining its order and its priority.
The Network Layer
The network layer provides the physical routing of the data, determining the
path between the machines. The network layer handles all these routing issues,
relieving the higher layers from this issue.
The network layer examines the network topology to determine the best route
to send a message, as well as figuring out relay systems. It is the only network
layer that sends a message from source to target machine, managing other
chunks of data that pass through the system on their way to another machine.
The Data Link Layer
The data link layer, according to the OSI reference paper, “provides for the
control of the physical layer, and detects and possibly corrects errors that can
occur.” In practicality, the data link layer is responsible for correcting
transmission errors induced during transmission (as opposed to errors in the
application data itself, which are handled in the transport layer).
The data link layer is usually concerned with signal interference on the
physical transmission media, whether through copper wire, fiber optic cable,
or microwave. Interference is common, resulting from many sources,
including cosmic rays and stray magnetic interference from other sources.
The Physical Layer
The physical layer is the lowest layer of the OSI model and deals with the
“mechanical, electrical, functional, and procedural means” required for
transmission of data, according to the OSI definition. This is really the wiring
or other transmission form.
When the OSI model was being developed, a lot of concern dealt with the
lower two layers, because they are, in most cases, inseparable. The real world
treats the data link layer and the physical layer as one combined layer, but the
formal OSI definition stipulates different purposes for each. (TCP/IP includes
the data link and physical layers as one layer, recognizing that the division is
more academic than practical.)
What is DHCP.
DHCP is a protocol which is designe for Automatic Give the IP Address to
DHCP client..
DHCP Assine the IP Address for few days Lease & capture the clients MAC
address..
It is Updated version of BootP…
DHCP stands for “Dynamic Host Configuration Protocol
DHCP’s purpose is to enable individual computers on an IP network to extract
their configurations from a server (the ‘DHCP server’) or servers, in
particular, servers that have no exact information about the individual
computers until they request the information. The overall purpose of this is to
reduce the work necessary to administer a large IP network. The most
significant piece of information distributed in this manner is the IP address.
1. Can I connect two computers to internet using same line ?
u can connect two computer using NAT wich use port forwarding method and proxy
server same time on the same line
How does a DHCP work ? When a pc with no Ip address just with an MAC
addrress boots up , what are the steps that Happen till the time a Ip is given to
the pc from a DHCP.
DHCP is used for MAC address to IP mapping its support both static and
dynamic mapping.Static mapping are done just like bootstrap and for dynamic
mapping it have database of MAC and IP when a packet with a MAC comes
ask for ip its check that assigne a dynamic IP fixed that for a specific time and
then return that packet with that IP
ping ia process which use ICMP protocl error message which is encapsulated
in a IP packets its calculate the round trip delay time by sending the packet
sending time and subtract it from arrival time. the error messages are
1.destination unrecheable
2.hardware error.
etc
its also sets maximum hop value and after it becomes 0 the packets discarted
Telnet is a application layer process of connection remote compter and local Area
Network compter by specifing the ip address by a specific port,
TCP is a transport layer protocol sued for reliable delivery of segmented packets
IP is network layer protocol used for end to end delivery of two nodes not reliable.
TCP is a connection oriented protocol that provides reliable transfer of information by
synchronization, error checking and sequencing of information to and from IP layer.
IP layer is transport of TCP. It provides path determination and packet
switching. IP layer uses ARP and RARP protocol to map IP to MAC address
and MAC to IP address respectively, to determine network addresses. It is
connectionless protocol that leaves all error checking functions on upper layer.
12. UDP is a connectionless protocol that do not provide reliable transfer of
information and is fast in nature as compare to TCP. This disadvantage on
other hand is suitable for applications like video and voice.
TCP/IP is a two-way communication between the client and the server and it
is a reliable and there is a confirmation regarding reaching the message to the
destination. It is like a phone call.
UDP is a one-way communication only between the client and the server and
it is not a reliable and there is no confirmation regarding reaching the message
to the destination.
Q. Can I connect two computers to internet using same line.
Ans..
Yes, we can connect two or more system using many types of mathodes..
1. Remote Help Invitations.. if you have high or medium speed internet
connection you can access the system..
2. VPN.. using the Virtual Private Network this is technology which is use to
make virtual network between any remote location. VPN make a tunnel type
connection for fast & secure communication.
3. Using third party software we have many type of VPN softwares.
What is a MAC address?
MAC is a machines Physical address, The internet is addressed based on a
logical addressing approach. Say,when the packet reaches say the bridge
connection a LAN, the question is..how does it identify, which computer it
needs to send the packet to. For this it uses the concept of ARP, Address
Resolution Protocol, which it uses over time to build up a table mapping from
the Logical addresses to the Physical addresses. Each computer is identified
using its MAC/Physical address ( u can use the ipconfig -all option to get ur
MAC address).
Ques 2: Diffrence Betw. Switch , Hub, Router..
Hub: 1.it is a layer1 device..used to connect various machine on Lan.
2.It forwards broadcast by default.
3.It supports one collision domain and one broadcast domain.
4.it works on Bus topolog resulting less speed.
Switch: 1. A layer2 device.
2. Forward broadcast first time only.
3. one broadcast domain & colliosion domains depends on no. of ports.
4.It is based on Star Topology giving 100mbps to every pc on Lan.
Router: 1. Does not Broadcast by default.
2. breaks up Broadcast domain.
3. Also called Layer3 switch.
Ques 9: VPN’s
VPN(Virtual Private Network )… these are bascially the logical networks on
the physical line… you can have many VPN oveer same line..
Need of VPN arises when your company need to increase the network but
don’t want to buy any more switches.. take an eg. your dept. your room is
packed with employees and ur company need to add 4 more persons to ur
deptt. what will they do.. the solution is to create VPN’s…you can configure
the switch ports in other deptts. and create a specific VLAN of ur deptt.so that
the persons can sit there and access to the required pcs.
What is ARP/RARP?
ARP: Stands for Address Resolution Protocol…whenever a request is sent by
a node on one network to the node on another network the Physical
address(MAC) is required and for this the IP address need to be flow over the
network..whenver a router with that network (IP) gets the msg. the required
MAC address is sent through the network this process of converting the IP
address to MAC address is Called ARP..and the reverse thats the convertion of
the Mac address to the IP address is called RARP ( Reverse Address
Resolution Protocol)
RARP:RARP is a TCP/ IP protocol term similar to ARP. RARP is the method that
some machines use to determine their own IP address. Essentially, a machine
sends out a packet that includes a machine hardware address. A server on the
same network receives the packet and looks up the hardware address. The
server then sends back the associated IP address of that machine. It is used for
machines that do not have the capability to store their own IP addresses
locally.
ARP:Address Resolution Protocol. ARP is the protocol used by IP (as in TCP/IP)
for address resolution. Address resolution refers to the ability of a station to
resolve another station’s MAC (hardware) address given its IP address.
VLANs logically segment switched networks based on the functions, project
teams, or applications of the organization regardless of the physical location or
connections to the network.
VLANs provide segmentation based on broadcast domains.
All workstations and servers used by a particular workgroup share the same
VLAN, regardless of the physical connection or location.
VLANs are created to provide segmentation services traditionally provided by
physical routers in LAN configurations.
VLANs address scalability, security, and network management. Routers in
VLAN topologies provide broadcast filtering, security, and traffic flow
management.
What is a VPN?
A VPN stands for Virtual Private Network. In english it is a direct tunnel into
a remote network. It allows users to work with certain applications, printers,
network drives and shares as if they where sitting in the office.
How do you distinguish a DNS problem from a network problem?
The first thing to do is to ping any switches, routers, or any other devices on
the network. If your pings come back complete with 0% lost, then it will most
likely be a DNS issue. If you can ping other devices but can not ping the
switch that sits in front of the DNS, then it will be a network issue.
What is a metric?
Routing tables contain information used by switching software to select the
best route.
Routing algorithms have used many different metrics to determine the best
route. Sophisticated routing algorithms can base route selection on multiple
metrics, combining them in a single (hybrid) metric. All the following metrics
have been used:
•Path length
•Reliability
•Delay
•Bandwidth
•Load
•Communication cost
What is the difference between a hub, switch, and router?
Hub works on layer 1 of OSI model
Swich works on layer 2 of OSI model
Router works on layer 3 of OSI model
Hub does not seperate collision and broadcost domain
swich seperate collision domain but does not seperate broadcost domain.
router does seperate collision and broadcost domain
what is socket?
The purpose of the VRRP packet is to communicate to all VRRP routers the
priority and the state of the Master router associated with the Virtual Router
ID.
When a computer program needs to connect to a local or wide area network
such as the Internet, it uses a software component called a socket. The socket
opens the network connection for the program, allowing data to be read and
written over the network. It is important to note that these sockets are
software, not hardware, like a wall socket. So, yes, you have a much greater
chance of being shocked by a wall socket than by a networking socket.
Sockets are a key part of Unix and Windows-based operating systems. They
make it easy for software developers to create network-enabled programs.
Instead of constructing network connections from scratch for each program
they write, developers can just include sockets in their programs. The sockets
allow the programs to use the operating system’s built-in commands to handle
networking functions. Because they are used for a number of different network
protocols (i.e. HTTP, FTP, telnet, and e-mail), many sockets can be open at
one time.
When I ping an IP address the result comes out succesfull, but when I ping
with host name no result comes, ping fails. why?
Because the denied permission had been assigned to ping command (HOST
NAME). Check the Firewall( windows and firewall software)
how to configure DNS in windows O/S with the command or stepes….?
Netsh commands for Interface IP. You can use commands in the Netsh
Interface IP context to configure the TCP/IP protocol (including addresses,
default gateways, DNS servers, and WINS servers) and to display
configuration and statistical information.
USE HELP COMMAND FOR MORE INFORMATION (netsh/?)
What is a full-class C in CIDR notation?
Ans :
For class A ..default subnet mask is 255.0.0.0 so CIDR notation is /8
For class B ..default subnet mask is 255.255.0.0 so CIDR notation is /16
What is a full-class C in CIDR notation
CIDR specifies an IP address range using a combination of an IP address and
its associated network mask. CIDR notation uses the following format xxx.xxx.xxx.xxx/n
Full Class C in CIDR notation can be represented by
Example 10.16.0.0/16
This is a 256 class C = FIRST CLASS B
Now they here are a few more
10.16.0.0/17 is a 128 class C
10.16.0.0/16 is a 64 class C and so on.For class C ..default subnet mask is
255.255.255.0 so CIDR notation is /24
What the Purpose of VLAN?
VLANs can enhance network security.
VLANs increase the number of broadcast domains while decreasing their size.
Network adds, moves, and changes are achieved by configuring a port into the
appropriate VLAN.
A group of users needing high security can be put into a VLAN so that no
users outside of the VLAN can communicate with them.
As a logical grouping of users by function, VLANs can be considered
independent from their physical or geographic locations.
What is OSPF?
Open Shortest Path First
OSPF) is a non-proprietary link-state routing protocol limited to use with the
TCP/IP stack. Open Shortest Path First (OSPF) is an open standards routing
protocol that’s been implemented by a wide variety of network vendors,
including Cisco. If you have multiple routers and not all of them are Cisco, So
your remaining options are basically RIPv1, RIPv2, or OSPF. If it’s a large
network, then, really, your only options are OSPF
OSPF provides the following features:
Consists of areas and autonomous systems
Minimizes routing update traffic
Allows scalability
Supports VLSM/CIDR
Has unlimited hop count
Allows multi-vendor deployment (open standard)
Characteristic of OSPF
Type of protocol - Link-state
Classless support - Yes
VLSM support - Yes
Auto summarization - No
Manual summarization - Yes
Discontiguous support - Yes
Route propagation - Multicast on change
Path metric - Bandwidth
Hop count limit - None
Convergence - Fast
Peer authentication - Yes
Hierarchical network - Yes (using areas)
Updates Event - Triggered
What is Spanning Tree protocol?
In a Layer 2 environment (switching or bridging), however, no routing
protocols are used, and active redundant paths are neither allowed nor
desirable. Instead, some form of bridging provides data transport between
networks or switch ports. The Spanning Tree Protocol (STP) provides network
link redundancy so that a Layer 2 switched network can recover from failures
without intervention in a timely manner. It vigilantly monitors the network to
find all links, making sure that no loops occur by shutting down any redundant
links. STP uses the spanning-tree algorithm (STA) to first create a topology
database, then search out and destroy redundant links.
OSPF








Describe OSPF in your own words.
OSPF areas, the purpose of having each of them
Types of OSPF LSA, the purpose of each LSA type
What exact LSA type you can see in different areas
How OSPF establishes neighboor relation, what the stages are
If OSPF router is stucked in each stage what the problem is and how to
troubleshoot it
OSPF hierarchy in the single or multi areas. Cool OSPF behavior in broadcast
and nonbroadcast
Draw the diagram of typical OSPF network and explain generally how it
works, DR, BDR, election, ASBR, ABR, route redistribution and
summarization
STP







How it works and the purpose
Diff types (SSTP, MSTP, RSTP) Cisco - PVST/PVST+
root election
Diff. port stages and timing for convergence
Draw the typical diagram and explain how diff types of STP work
What ports are blocking or forwarding
How it works if there are topology changes
ACLs




What are they
Diff types
Write an example if you want to allow and to deny…
Well-known port numbers (DNS - 53 and etc…)
QOS



What is that
What is the diff b/w L2 and L3 QoS
How it works
Network:







Draw the typical network diagram you have to deal with
explain how it works
What part of it you are responsible
firewall, what is that, how it works, how it is diff from ACLs
What problems with the network you had had and how you solved it.
What are the ways to troubleshoot the network, techniques, commands
network security, ways to achieve it
Switching:






VLANs
STP
How a L2 switch works with broadcast, unicast, multicast, known/unknown
traffic
VRRP, GLBP
port monitoring and mirroring
L3 switch, how it works
PIM sparse and dense modes
1. Describe the OSI model.
2. What is the difference between a repeater, bridge, router? Relate this to the
OSI model.
3. Describe an Ethernet switch and where it fits into the OSI model.
4. What is a VLAN? What is an ELAN? What is the difference?
5. Relate FDDI/ATM/SONET to the OSI model.
6. Explain how to configure a host network interface (e.g. IP address, netmask,
broadcast address)?
7. Describe Ethernet packet contents: min/max size, header.
8. Describe TCP/IP and its protocols.
9. Describe ATM and what are its current advantages and disadvantages.
10. Describe SONET.
11. What are the maximum distances for CAT5 cabling?
12. Describe UDP and TCP and the differences between the two.
13. What is your current IP address? Hoiw do you find that out on different OSs?
14. Describe what a broadcast storm is.
15. Describe what a runt, a giant, and a late collision are and what causes each of
them.
16. How do you distinguish a DNS problem from a network problem?
17. Describe the Bandwidth Delay problem.
1. Describe the principle of multi-layer switching.
Open Systems Interconnection (OSI) model is a reference model developed by
ISO (International Organization for Standardization) in 1984, as a conceptual
framework of standards for communication in the network across different
equipment and applications by different vendors. It is now considered the
primary architectural model for inter-computing and internetworking
communications.
Communication process has been divided into 7 layers.
1.physical
2.Datalink
3.network
4.transport
5.session
6.presentation
7.application
In all the above layers differnt works are performed according to the work
divided among these layers.
#9 ATM is the short form for Asynchonous Transfer Mode.
Currently ATM is used in places where we require high speed data transfer.
The ATM is a technology of sending and recieving the packets and so it
requires carriers such as SONET/SDH etc. The packet size of the ATM packet
is fixed and is 53 bytes.
Advantages
**********
1. As the packet size is fixed switching can be implemented in Hardware and
so it is very fast.
2. The packet size small and constant so the latency is too small so that it can
support real time data transfer.
3. The ATM supports Quality of Service (QOS).
Disadvantages.
*************
1. The packet size is too small and if u take the additional header that is
attached then it will be huge. So the header size to the actual data send is less
and so overhead is too much.
2. End to end is not ATM and so we still require ATM adapters and other
equipments.
Regards
Ganesh Vasudevan
#2
Repeaters, bridges, and routers are devices used to link individual LANs
together to form larger internetworks. each one operates within a specific layer
of the OSI model.
Repeaters operate at the Physical Layer of the OSI model. They simply listen
to all network traffic on one port and send it back out through one or more
ports, extending smaller networks into a larger, single network. A repeater
simply receives frames, regenerates them, and passes them along. It performs
no processing of the frames or the data they contain.
Relation to OSI Layer Functions
Because repeaters operate at the Physical Layer, they do not need any
addressing data from the frame. Repeaters do not even look at the frames they
are forwarding, passing along even damaged frames. This can be especially
problematic if one segment malfunctions and begins a broadcast storm. All
those erroneous broadcasts are forwarded faithfully by the repeater!
Bridges operate at the Data Link Layer. They use the Data Link Layer and its
physical addressing to join several networks into a single network efficiently.
Bridges join two or more network segments together, forming a larger
individual network. They function similarly to a repeater, except a bridge
looks to see whether data it receives is destined for the same segment or
another connected segment. If the data is destined for a computer on the same
segment, the bridge does not pass it along. If that data is going to a computer
on another segment, the bridge sends it along.
Bridges use a routing table to determine whether data is destined for the local
network or not. On a bridge, the routing table contains MAC addresses. Each
time the bridge receives data, it looks in its routing table to see whether or not
the data is destined for a node on the local network. If it belongs to the local
network, it does not forward the data. If it is not destined for the local network,
it looks in the routing table to determine which physical network the
destination address resides on, and sends the data out onto that network.
Bridges can not join dissimilar networks. If you have an Ethernet network and
a Token Ring network, you cannot use a bridge; you must use a router.
However, a bridge can join networks that use the same frame type but
different media, just like a repeater.
Relation to OSI Layer Functions
Bridges work with the MAC sublayer of the Data Link Layer. Remember that
the Data Link Layer is concerned with communicating on the local network
only. Bridges use information from the MAC sublayer to make decisions on
whether a packet is destined for the same network or another network. The
MAC address is used by bridges to determine first if the destination is local or
not, then to choose which connected network it must go to.
Router:
The Network Layer is concerned with network addressing for larger networks
that consist of many physical networks, often with multiple paths between
them. Routers operate at the Network Layer. They use the addressing
information provided at the network level to join the many networks together
to form an internetwork.
Functions
Routers divide larger networks into logically designed networks. Routers may
seem a lot like bridges, but they are much smarter. Bridges cannot evaluate
possible paths to the destination to determine the best route. This can result in
inefficient use of network resources. Bridges also cannot use redundant paths.
While two bridges can connect two networks, they risk sending packets in an
endless loop between the two networks. This behavior eventually saturates the
network, rendering it unusable.
The drawback to a router’s inherent intelligence is their speed. Because they
process so much information, routers tend to be slower than bridges.
Relation to OSI Layer Functions
Routers operate at the Network Layer of the OSI model. The Network Layer
provides addressing for internetworks, and routers use this addressing
information to determine how to pass along packets of data. Because routers
operate at the Network Layer, they can link different physical network
topologies.
Qustions on Tecnologies like SDH,DWDM,CDMA,PCM & equipments based
on these technology will be helpfull for telelcom people.
#12
Difference between UDP and TCP.
UDP is much faster, used for streaming video and audio files on the net. TCP
is slower, because it contains the main factor UDP does not have, which is
flow/error control.
TCP is used by most users on the net because data transferred needs to be
verified. Error correction allows data to be effectively received
Vlan is virtual lan it used to put some interface in one broadcast domain and
some interfaces in another,it used for security purpose and group departments,
based on the mac address the vlan is configured in the switch ports
TCP/IP is a set of Protocol, which is use to communicate data(packet)between
to host and destination PCs.
TCP(Transmission control protocol)
IP (Internet Protocol)
Tcp/IP work on OSI Model. and Its port is 80.
Repeater is a network device which is use to regenerate packet(data) out of
100m distance of server.
Bridge: it is also a network device which is use to connect multiple Pc in the
network. it is use in small or LANs Network. It work on Layer 2 or 3(some
times)of OSI Model.it is connect pc through HUB.
Router: Router is electronic machine and network device which is work as
gateway.Router connect multiple Network or wireless network between two
office.it base on Layer 3 of OSI Model.
VLAN — Virtual Local Area Network
ELAN — Emulated Local Area Network
Difference between these two are as follows:An ELAN is a type of VLAN over an ATM network. However, it is defined at
the MAC layer while VLANs may be defined by a MAC layer or by a IP
address, including by protocols.
1
state in which a message that has been broadcast across a network results in
even more responses, and each response results in still more responses in a
snowball effect. A severe broadcast storm can block all other network traffic,
resulting in a network meltdown. Broadcast storms can usually be prevented
by carefully configuring a network to block illegal broadcast messages.
HSRP:
Hot Standby Routing Protocol, a proprietary protocol from Cisco. HSRP is a
routing protocol that provides backup to a router in the event of failure. Using
HSRP, several routers are connected to the same segment of an Ethernet,
FDDI or token-ring network and work together to present the appearance of a
single virtual router on the LAN. The routers share the same IP and MAC
addresses, therefore in the event of failure of one router, the hosts on the LAN
are able to continue forwarding packets to a consistent IP and MAC address.
The process of transferring the routing responsibilities from one device to
another is transparent to the user.
VRRP :
Virtual Router Redundancy Protocol, an election protocol that dynamically
assigns responsibility for one or more virtual router(s) to the VRRP router(s)
on a LAN, allowing several routers on a multiaccess link to utilize the same
virtual IP address. A VRRP router is configured to run the VRRP protocol in
conjunction with one or more other routers attached to a LAN. In a VRRP
setup, one router is elected as the master router with the other routers acting as
backups in case of the failure of the master router.
Multilayer switching
Multilayer switching is simply the combination of traditional Layer 2
switching with Layer 3 routing in a single product. Multilayer switching is
new, and there is no industry standard yet on nomenclature. Vendors, analysts,
and editors don’t agree about the specific meaning of terms such as multilayer
switch, Layer 2 router, Layer 3 switch, IP switch, routing switch, switching
router, and wirespeed router. The term multilayer switch seems to be the best
and most widely used description of this class of product that performs both
Layer 3 routing and Layer 2 switching functions.
Multilayer switching is usually implemented through a fast hardware such as a
higher-density ASICs (Application-Specific Integrated Circuits), which allow
real-time switching and forwarding with wirespeed performance, and at lower
cost than traditional software-based routers built around general-purpose
CPUs.
The following are some basic architecture approaches for the multiplayer
switches:
Generic Cut-Through Routing: In the multi-layer switching architecture Layer
3 routing calculations are done on the first packet in a data flow. Following
packets belonging to the same flow are switched at Layer 2 along the same
route. In other words, route calculation and frame forwarding are handled very
differently here.
ATM-Based Cut-Through Routing - This is a variation of generic cut-through
routing which is based on ATM cells rather than frames. ATM-based cutthrough routing offers several advantages such as improved support of LAN
emulation and multi-vendor support in the form of the Multiprotocol Over
ATM (MPOA) standard. Products referred to as IP switches and tag switches
generally fall into this category.
Layer 3 Learning Bridging CIn this architecture, routing is not provided.
Instead, it uses IP “snooping” techniques to learn the MAC/IP address
relationships of endstations from true routers that must exist elsewhere in the
network. Then it redirects traffic away from the routers and switches it based
on its Layer 2 addresses.
Wirespeed Routing - Wirespeed architecture routes every packet individually.
It is often referred to as packet-by-packet Layer 3 switching. Using advanced
ASICs to perform Layer 3 routing in hardware, it implements dynamic routing
protocols such as OSPF and RIP. In addition to basic IP routing, it supports IP
multicast routing, VLAN segregation, and multiple priority levels to assist in
quality of service.
Q#12 - TCP is a connection oriented protocol which works on ACK based
communication. It provides error recovery & detection under Layer 4 of OSI
model. Also, the TCP works in reliable network which offers secured
communication and no loss of data.
UDP is a User Datagram Protocol, used in a faster network. No ACK is
required for the data sent to the network. Also, the application like TFTP
prefers using UDP for its transport layer communication. Its a connectionless
protocol.
CCNA/Cisco admin interview questions
1. You need to retrieve a file from the file server for your word processing
application, which layer of the OSI model is responsible for this function?
1. Presentation layer
2. Application layer
3. Session layer
4. Transport layer
5. Datalink layer
2. You are working in a word processing program, which is run from the
file server. Your data comes back to you in an unintelligible manner.
Which layer of the OSI model would you investigate?
1. Application layer
2. Presentation layer
3. Session layer
4. Network layer
5. Datalink layer
3. The IEEE subdivided the datalink layer to provide for environments that
need connectionless or connection-oriented services. What are the two
layers called?
1. Physical
2. MAC
3. LLC
4. Session
5. IP
4. You are working with graphic translations. Which layer of the OSI model
is responsible for code formatting and conversion and graphic standards.
1. Network layer
2. Session layer
3. Transport layer
4. Presentation layer
5. Which is the best definition of encapsulation?
1. Each layer of the OSI model uses encryption to put the PDU from the
upper layer into its data field. It adds header and trailer information
that is available to its counterpart on the system that will receive it.
2. Data always needs to be tunneled to its destination so encapsulation
must be used.
3. Each layer of the OSI model uses compression to put the PDU from
the upper layer into its data field. It adds header and trailer information
that is available to its counterpart on the system that will receive it.
4. Each layer of the OSI model uses encapsulation to put the PDU from
the upper layer into its data field. It adds header and trailer information
that is available to its counterpart on the system that will receive it.
6. Routers can be configured using several sources. Select which of the
following sources can be used.
1. Console Port
2. Virtual Terminals
3. TFTP Server
4. Floppy disk
5. Removable media
7. Which memory component on a Cisco router contains the dynamic
system configuration?
1. ROM
2. NVRAM
3. Flash
4. RAM/DRAM
8. Which combination of keys will allow you to view the previous commands
that you typed at the router?
1. ESC-P
2. Ctrl-P
3. Shift-P
4. Alt-P
9. Which commands will display the active configuration parameters?
1. show running-config
2. write term
3. show version
4. display term
10. You are configuring a router, which prompt tells you that you are in the
privileged EXEC mode?
1. @
2. >
3. !
4. :
5. #
11. What does the command “IP name-server 255.255.255.255″ accomplish?
1. It disables domain name lookup.
2. It sets the domain name lookup to be a local broadcast.
3. This is an illegal command.
4. The command is now defunct and has been replaced by “IP servername ip any”
12. The following selections show the command prompt and the configuration
of the IP network mask. Which two are correct?
1. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal }
2. Router#term IP netmask-format { bitcount | decimal | hexadecimal }
3. Router(config-if)#IP netmask-format { bitcount | decimal |
hexadecimal }
4. Router#ip netmask-format { bitcount | decimal | hexadecimal }
13. Which layer is responsible for flow control with sliding windows and
reliability with sequence numbers and acknowledgments?
1. Transport
2. Application
3. Internet
4. Network Interface
14. Which processes does TCP, but not UDP, use?
1. Windowing
2. Acknowledgements
3. Source Port
4. Destination Port
15. Select which protocols use distance vector routing?
1. OSPF
2. RIP
3. IGRP
4. PPP
Categories: Networking
| .NET Remoting questions and answers Windows 2000 administration questions |
8 Responses to “CCNA/Cisco admin interview questions”
1. Cisco maple Said:
May 23rd, 2005 12:13 am
1. 2
2. 1
3. 3,4
4. 4
5. 2
6. 1,2,3
7. 4
8. 2
9. 1
10. 5
11. 4
12. 3
13. 1
14. 1
15. 2,3
2. right answ Said:
September 4th, 2005 3:35 am
3: 2,3
4: 4
5: 4
6: 1,2
7: 4
8: 2
9: 1
10: 5
13: 1
14: 1,2
15: 2,3
3. just guessing Said:
June 20th, 2007 5:36 am
1). 2
2). 3
3). 2&3
4). 4
5). 4
6). 1&2
7). 2
8). 3
9). 1&3
10). 5
11). 2
12). 1&3
13). 1
14). 1&2
15). 2
4. vianayak Said:
July 16th, 2007 1:31 am
You need to retrieve a file from the file server for your word processing
application, which layer of the OSI model is responsible for this function?
Presentation layer
Application layer
Session layer
Transport layer
Datalink layer
You are working in a word processing program, which is run from the file
server. Your data comes back to you in an unintelligible manner. Which layer
of the OSI model would you investigate?
Application layer
Presentation layer
Session layer
Network layer
Datalink layer
The IEEE subdivided the datalink layer to provide for environments that need
connectionless or connection-oriented services. What are the two layers
called?
Physical
MAC
LLC
Session
IP
5. Nageswara Rao Said:
August 17th, 2007 2:37 pm
1.2
2.2
3.2,3
4.4
5.4
6.1,2
7.2
8.2
9.1
10.5
11.4
12
13.1
14.2
15.2,3
6. Hariom Jindal Said:
September 11th, 2007 4:28 am
Que.15Select which protocols use distance vector routing?
OSPF
RIP
IGRP
PPP
7. Hariom Jindal Said:
September 11th, 2007 4:29 am
Que.15 Select which protocols use distance vector routing?
1. OSPF
2. RIP
3. IGRP
4. PPP
Ans.:
RIP and IGRP use for distance vector routing..
8. ranit Said:
November 19th, 2007 8:05 am
1-3;1-5 ; 3-2,3 ; 4-4 ;5–4; 6–1,2 ; 7–2; 8–2 ; 9–1 ; 0–5 ; 1–2 ; 2–2 ; 3–1 ; 4–1,2
; 5–2,3
Networking and protocols interview questions
Q: What are the seven layers of the OSI model?
A: The layers are physical, data link, network, transport, session, presentation, and
application layers.
Q: In the TCP client-servel model, how does the three-way handshake work in
opening connection?
A: The client first sends a packet with sequence "x" to the server. When the server
receives this packet, the server will send back another packet with sequence "y",
acknowledging the request of the client. When the client receives the
acknowledgement from the server, the client will then send an acknowledge back to
the server for acknowledging that sequence "y" has been received.
Q: What is the purpose of exchanging beginning sequence numbers during the
the connection in the TCP client-server model?
A: To ensure that any data lost during data transfer can be retransmitted.
Q: How does Asynchronous Transfer Mode (ATM) work?
A: ATM works by transmitting all traffic in small, fixed-sized cells. These small,
fixed-size cells reduces queuing delay and can be switched quickly. ATM fits into
layer 2 of the OSI model and provides functions for framing and error correction. At
the port interface, ATM switches convert cells into frames, and vice versa. ATM
provides Quality of Service and traffic shaping.
Q: Given a Class B Network with subnet mask of 255.255.248.0 and a packet
addressed to 130.40.32.16, what is the subnet address?
A: Take the 2 addresses, write them in binary form, then AND them. The answer is
130.40.32.0
Categories: Networking
| Java interview questions SQL Server, DBA interview questions |
5 Responses to “Networking and protocols interview questions”
1. Sreedhar Said:
March 18th, 2005 6:42 am
How duplicated packets are generated in the network?
Answer: Due to re-transmissions
2. Harsha Said:
April 7th, 2005 6:40 pm
This is regarding the question :Q: Given a Class B Network with subnet mask of 255.255.248.0 and a packet
addressed to 130.40.32.16, what is the subnet address?
As the solution mentions, we need to AND the mask and IP. The first two
octets we know represent the network address of the class B IP. From the
given mask, in the third octet, there are five bits for the sub-network, meaning
the subnetwork of the given IP has the value 16. So the sub-network would be
130.40.16.x .
The mentioned answer 130.40.32.0 would be true if the third octet in the mask
was 255.
Comments welcome.
3. tanktop Said:
August 2nd, 2006 3:07 pm
Regarding 2… the answer 130.40.32.0 is correct for the host 130.40.32.16….
130.40.32.0(network) -> 130.40.39.255(broadcast)
4. santhosh Said:
March 2nd, 2007 9:41 am
1.physical layer
2.datalink layer
3.network layer
4.transport layer
5.session layer
6.presention layer
7.application layer
5. Ajay Said:
August 24th, 2007 6:38 am
the address range is correct in that Subnetting Question .
count in the blocks of 16.
130.40.16.0 - 130.40.31.255
130.40.32.0 - 130.40.47.255
130.40.48.0 - 130.40.63.255
and so on…
Question 3: Name the seven layers of the OSI Model and describe them briefly.
Physical Layer - covers the physical interface between devices and the rules by which
bits are passed from one to another.
Data Link Layer - attempts o make the physical link reliable and provides the means
to activate, maintain, and deactivate the link.
Network Layer - provides for the transfer of information between end systems across
some sort communications network.
Transport Layer - provides a mechanism for the exchange of data between end
system.
Session Layer - provides the mechanism for controlling the dialogue between
applications
in end systems.
Presentation Layer - defines the format of the data to be exchanged between
applications
and offers application programs a set of data transformation services.
Application Layer - provides a means for application programs to access the OSI
environment.
Question 4: What is the difference between TCP and UDP?
TCP and UDP are both transport-level protocols. TCP is designed to provide reliable
communication across a variety of reliable and unreliable networks and internets.
UDP provides a connectionless service for application-level procedures. Thus, UDP is
basically
an unreliable service; delivery and duplicate protection are not guareented.
Question 5: What does a socket consists of?
The combination of an IP address and a port number is called a socket.
Networking and Unix interview questions
What is UTP?
UTP — Unshielded twisted pair 10BASE-T is the preferred Ethernet medium of the
90s. It is based on a star topology and provides a number of advantages over coaxial
media:
It uses inexpensive, readily available copper phone wire. UTP wire is much easier to
install and debug than coax. UTP uses RG-45 connectors, which are cheap and
reliable.
What is a router? What is a gateway?
Routers are machines that direct a packet through the maze of networks that stand
between its source and destination. Normally a router is used for internal networks
while a gateway acts a door for the packet to reach the ‘outside’ of the internal
network
Download